中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR  > 信息安全国家重点实验室  > 会议论文

view all items

(Results 1-20 of 142)
Help
Items/Page:    Sort:
VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing [会议论文]
ICST International Conference on Security and Privacy in Communication Networks, Sydney, Australia, 2013/9/25-2013/9/27
Jun Jiang; Meining Nie; Purui Su; Dengguo Feng
  |  View/Download:17/2
 
HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented Programming [会议论文]
International Conference on Information and Communications Security, Friendship Hotel, Haidian District, Beijing, China, 2011/11/23-2011/11/26
Jun Jiang; Xiaoqi Jia; Dengguo Feng; Shengzhi Zhang; Peng Liu
  |  View/Download:21/1
 
an efficient pba protocol based on elliptic curves [会议论文]
2011 IEEE 3rd International Conference on Communication Software and Networks, ICCSN 2011, Xi'an, China, 27-May-20
Chu Xiaobo; Qin Yu; Feng Dengguo
  |  View/Download:15/0
 
an efficient group-based secret sharing scheme [会议论文]
7th International Conference on Information Security Practice and Experience, ISPEC 2011, Guangzhou, China, 30-May-20
Lv Chunli; Jia Xiaoqi; Lin Jingqiang; Jing Jiwu; Tian Lijun
  |  View/Download:10/1
 
demo: a sensor network time synchronization protocol based on fm radio data system [会议论文]
9th International Conference on Mobile Systems, Applications, and Services, MobiSys'11 and Co-located Workshops, Bethesda, MD, United states, 28-Jun-02
Li Liqun; Xing Guoliang; Sun Limin; Huangfu Wei; Zhou Ruogu; Zhu Hongsong
  |  View/Download:8/0
 
an instruction-level software simulation approach to resistance evaluation of cryptographic implementations against power analysis attacks [会议论文]
2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011, Shanghai, China, 10-Jun-02
Li Jiantang; Zhou Yongbin; Liu Jiye; Zhang Hailong
  |  View/Download:7/0
 
bcbc: a more efficient mac algorithm [会议论文]
7th International Conference on Information Security Practice and Experience, ISPEC 2011, Guangzhou, China, 30-May-20
Liang Bo; Wu Wenling; Zhang Liting
  |  View/Download:4/0
 
efficient secret sharing schemes [会议论文]
8th FTRA International Conference on Secure and Trust Computing, Data Management, and Application, STA 2011, Loutraki, Greece, 28-Jun-02
Lv Chunli; Jia Xiaoqi; Lin Jingqiang; Jing Jiwu; Tian Lijun; Sun Mingli
  |  View/Download:9/2
 
collusion attack on a self-healing key distribution with revocation in wireless sensor networks [会议论文]
11th International Workshop on Information Security Applications, WISA 2010, Jeju Island, Korea, Republic of, August 24,
Bao Kehua; Zhang Zhenfeng
  |  View/Download:15/0
 
color image segmentation using automatic pixel classification with support vector machine [会议论文]
Wang Xiang-Yang; Wang Qin-Yan; Yang Hong-Ying; Bu Juan
  |  View/Download:9/1
 
attacking bivium and trivium with the characteristic set method [会议论文]
4th International Conference on the Theory and Application of Cryptographic Techniques, AFRICACRYPT 2011, Dakar, Senegal, 5-Jul-20
Huang Zhenyu; Lin Dongdai
  |  View/Download:7/0
 
depsim: a dependency-based malware similarity comparison system [会议论文]
6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Shanghai, China, 20-Oct
Yi Yang; Lingyun Ying; Rui Wang; Purui Su; Dengguo Feng
  |  View/Download:9/2
 
Distinguishing Attacks on LPMAC Based on the Full RIPEMD and Reduced-Step RIPEMD-{256,320}* [会议论文]
6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Shanghai, China, 20-Oct
Wang Gaoli
  |  View/Download:8/1
 
efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost [会议论文]
5th International Conference on Provable Security, ProvSec 2011, Xi'an, China, 16-Oct
Chen Cheng; Zhang Zhenfeng; Feng Dengguo
  |  View/Download:37/0
 
acquiring key privacy from data privacy [会议论文]
6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Shanghai, China, 20-Oct
Zhang Rui
  |  View/Download:22/1
 
exploiting fm radio data system for adaptive clock calibration in sensor networks [会议论文]
9th International Conference on Mobile Systems, Applications, and Services, MobiSys'11 and Co-located Workshops, Bethesda, MD, United states, 28-Jun-02
Li Liqun; Xing Guoliang; Sun Limin; Huangfu Wei; Zhou Ruogu; Zhu Hongsong
  |  View/Download:149/0
 
fault propagation pattern based relevant faulty ciphertexts filtering towards dfa on aes [会议论文]
2011 IEEE 3rd International Conference on Communication Software and Networks, ICCSN 2011, Xi'an, China, 27-May-20
Wang Na; Zhou Yongbin
  |  View/Download:7/0
 
gateway-oriented password-authenticated key exchange protocol with stronger security [会议论文]
5th International Conference on Provable Security, ProvSec 2011, Xi'an, China, 16-Oct
Wei Fushan; Ma Chuangui; Zhang Zhenfeng
  |  View/Download:17/0
 
general construction of chameleon all-but-one trapdoor functions [会议论文]
5th International Conference on Provable Security, ProvSec 2011, Xi'an, China, 16-Oct
Liu Shengli; Lai Junzuo; Deng Robert H.
  |  View/Download:12/1
 
a short signature scheme from the rsa family [会议论文]
13th Information Security Conference, ISC 2010, Boca Raton, FL, United states, 25-Oct
Yu Ping; Xue Rui
  |  View/Download:11/0
 

 

Valid XHTML 1.0!
Copyright © 2007-2018  中国科学院软件研究所 - Feedback
Powered by CSpace